Paper Title : DESIGN AND IMPLEMENTATION OF WEB APPLICATION USING FIREWALL MODEL
ISSN : 2394-2231
Year of Publication : 2022
10.5281/zenodo.6508235
MLA Style: DESIGN AND IMPLEMENTATION OF WEB APPLICATION USING FIREWALL MODEL "Asst. Prof Vishakha Akhare, ROHAN RATHI,PORNIMA KOLHE, PIYUSH ADASE" Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: DESIGN AND IMPLEMENTATION OF WEB APPLICATION USING FIREWALL MODEL "Asst. Prof Vishakha Akhare, ROHAN RATHI,PORNIMA KOLHE, PIYUSH ADASE" Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
One of the Intrusion Detection System (IDS) methods for preventing web servers from HTTP attacks is Web Application Firewall (WAF). WAF is a security solution that can detect and block a variety of threats, including XSS, Proxy, Bad Bot, and SQL-injection. As the number of Web apps grows, security becomes more exposed to a range of attacks. The majority of these attacks are aimed at the web application layer, and a network firewall alone will not be able to protect them. The effectiveness of these attacks is mostly attributable to the ineptitude of application developers when it comes to building online apps and flaws in existing technologies. Web application attacks are the newest trend, with hackers attempting to target web applications using a number of methods. In this paper, we propose a centralised For web application security, use a web firewall solution.that will provide a new type of synchronised system with for an online application, the capacity to identify and avoid a number of web application assaults large number a large number of hosts at the same time using a centralised command and control system. The information is subsequently sent to a server by the infected client. centralised command and control server, which will distribute the attack information to all of the integrated hosts.
Reference
[1] Critical Analysis on Web Application Firewall Solutions, Abdul Razzaq, Ali Hur, Sidra Shahbaz, Muddassar Masood, H Farooq Ahmad [2] Detecting inconsistent firewall configuration rules using range algorithm, Ahmed Farouk , Hamdy N.Agiza , Elsayed Radwan [3] Centralized Web Application Firewall Security System Saher Manaseer1 & Ahmad K. Al Hwaitat [4]Jim Beechey, “Web Application Firewalls:Defense in Depth for Your Web Infrastructure” March 2009 [5] A Mayer, A Wool, E Ziskind, 2000. “Fang: A Firewall Analysis Engine.” IEEE SYMPOSIUM ON SECURITY AND PRIVACY [6] WEB APPLICATION FIREWALL: REVIEW Muhammad Saidu Aliero1 , Bilyaminu Isah Shamaki2 , Ibrahim abubakar3 , Bello shamsudden kalgo4 , Abdul-azeez Muhammad Bello [7] Aliero MS, Ardo AA, Ghani I, Atiku M. “Classification of Sql Injection Detection And Prevention Measure”. IOSR Journal of Engineering (IOSRJEN), ISSN (e). 2016:2250- 3021
Keywords
— Web application firewalls (WAF), web application solutions, SQL Injection, XSS, DDoS Attack, Suspicious User Behaviour.